Virtualization for Security
Details
Informationen zum Autor John Hoopes, Senior Consultant for Verisign, is a graduate of the University of Utah. John's professional background includes an operational/support role on many diverse platforms, including IBM AS/400, IBM Mainframe (OS/390 and Z-Series), AIX, Solaris, Windows, and Linux. John's security expertise focuses on application testing with an emphasis in reverse engineering and protocol analysis. Before becoming a consultant, John was an application security testing lead for IBM, with responsibilities including secure service deployment, external service delivery, and tool development. John has also been responsible for the training and mentoring of team members in network penetration testing and vulnerability assessment. As a consultant, John has lead the delivery of security engagements for clients in the retail, transportation, telecommunication, and banking sectors. Klappentext One of the biggest buzzwords in the IT industry for the past few years! virtualization has matured into a practical requirement for many best-practice business scenarios! becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources! virtualization affords unprecedented means for intrusion and malware detection! prevention! recovery! and analysis. Taking a practical approach in a growing market underserved by books! this hands-on title is the first to combine in one place these most important and sought-after uses of virtualization for enhanced security. Already gaining buzz and traction in actual usage at an impressive rate! Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. With this growth in adoption! security is becoming a much more serious concern. Zusammenfassung In addition to saving time and other resources! virtualization affords unprecedented means for intrusion and malware detection! prevention! recovery! and analysis. This book combines the uses of virtualization for security! including sandboxing! disaster recovery and high availability! forensic analysis! and honeypotting. Inhaltsverzeichnis Chapter 1: Introduction to Virtualization for Security Chapter 2: Sandboxing Chapter 3: Disaster Recovery and High Availability Chapter 4: Forensic Analysis Chapter 5: Honeypotting Chapter 6: Securing Virtualization AUDIENCE...
Klappentext
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place these most important and sought-after uses of virtualization for enhanced security. Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. With this growth in adoption, security is becoming a much more serious concern.
Zusammenfassung
In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. This book combines the uses of virtualization for security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Inhalt
Chapter 1: Introduction to Virtualization for Security
Chapter 2: Sandboxing
Chapter 3: Disaster Recovery and High Availability
Chapter 4: Forensic Analysis
Chapter 5: Honeypotting
Chapter 6: Securing Virtualization AUDIENCE
Weitere Informationen
- Allgemeine Informationen
- GTIN 09781597493055
- Anzahl Seiten 357
- Herausgeber Elsevier LTD, Oxford
- Gewicht 801g
- Untertitel Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
- Größe H238mm x B192mm x T23mm
- Jahr 2008
- EAN 9781597493055
- Format Kartonierter Einband
- ISBN 978-1-59749-305-5
- Veröffentlichung 01.09.2009
- Titel Virtualization for Security
- Autor John Hoopes , Tom Olzak
- Sprache Englisch